{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T04:09:45Z","timestamp":1764475785183,"version":"3.46.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2024MF136"],"award-info":[{"award-number":["ZR2024MF136"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00034-025-03249-9","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T07:44:10Z","timestamp":1753775050000},"page":"9484-9511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Robustness and Invisibility of Color Image Watermarking Through Discrete Hankel and Hadamard Transforms"],"prefix":"10.1007","volume":"44","author":[{"given":"Ziyang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chongyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qingtang","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"issue":"1","key":"3249_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"J Abraham","year":"2019","unstructured":"J. Abraham, V. Paul, An imperceptible Spatial domain color image watermarking method. J. King Saud University-Computer Inform. Sci. 31(1), 125\u2013133 (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004","journal-title":"J. King Saud University-Computer Inform. Sci."},{"key":"3249_CR2","doi-asserted-by":"publisher","first-page":"32361","DOI":"10.1007\/s11042-020-09422-3","volume":"79","author":"S Al-Ardhi","year":"2020","unstructured":"S. Al-Ardhi, V. Thayananthan, A. Basuhail, A new vector map watermarking technique in frequency domain based on LCA-transform. Multimedia Tools Appl. 79, 32361\u201332387 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09422-3","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"3249_CR3","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1364\/josaa.32.000611","volume":"32","author":"N Baddour","year":"2015","unstructured":"N. Baddour, U. Chouinard, Theory and operational rules for the discrete Hankel transform. JOSA A 32(4), 611\u2013622 (2015). https:\/\/doi.org\/10.1364\/josaa.32.000611","journal-title":"JOSA A"},{"key":"3249_CR4","doi-asserted-by":"publisher","first-page":"122062","DOI":"10.1016\/j.eswa.2023.122062","volume":"238","author":"F Cao","year":"2024","unstructured":"F. Cao, D. Guo, T. Wang, H. Yao, J. Li, C. Qin, Universal screen-shooting robust image watermarking with channel-attention in DCT domain. Expert Syst. Appl. 238, 122062 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.122062","journal-title":"Expert Syst. Appl."},{"key":"3249_CR5","doi-asserted-by":"publisher","first-page":"11800","DOI":"10.1109\/access.2020.2966251","volume":"8","author":"Y Cao","year":"2020","unstructured":"Y. Cao, F. Yu, Y. Tang, A digital watermarking encryption technique based on FPGA cloud accelerator. IEEE Access. 8, 11800\u201311814 (2020). https:\/\/doi.org\/10.1109\/access.2020.2966251","journal-title":"IEEE Access."},{"key":"3249_CR6","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11760-013-0555-x","volume":"9","author":"M Cedillo-Hernandez","year":"2015","unstructured":"M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, H. Perez-Meana, Robust watermarking method in DFT domain for effective management of medical imaging. Signal. Image Video Process. 9, 1163\u20131178 (2015). https:\/\/doi.org\/10.1007\/s11760-013-0555-x","journal-title":"Signal. Image Video Process."},{"issue":"6","key":"3249_CR7","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1007\/s00371-021-02277-1","volume":"38","author":"S Chen","year":"2022","unstructured":"S. Chen, Q. Su, H. Wang, G. Wang, A high-efficiency blind watermarking algorithm for double color image using Walsh Hadamard transform. Visual Comput. 38(6), 2189\u20132205 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02277-1","journal-title":"Visual Comput."},{"issue":"17","key":"3249_CR8","doi-asserted-by":"publisher","first-page":"12517","DOI":"10.1007\/s00500-023-07898-3","volume":"27","author":"S Chen","year":"2023","unstructured":"S. Chen, Q. Su, H. Wang, G. Wang, An improved blind watermarking method facing dual color images based on Hadamard transform. Soft. Comput. 27(17), 12517\u201312538 (2023). https:\/\/doi.org\/10.1007\/s00500-023-07898-3","journal-title":"Soft. Comput."},{"key":"3249_CR9","doi-asserted-by":"publisher","first-page":"108088","DOI":"10.1016\/j.sigpro.2021.108088","volume":"185","author":"Y Chen","year":"2021","unstructured":"Y. Chen, Z.G. Jia, Y. Peng, D. Zhang, A new structure-preserving quaternion QR decomposition method for color image blind watermarking. Sig. Process. 185, 108088 (2021). https:\/\/doi.org\/10.1016\/j.sigpro.2021.108088","journal-title":"Sig. Process."},{"key":"3249_CR10","doi-asserted-by":"publisher","unstructured":"J. Chopra, A. Kumar, A.K. Aggarwal, A. Marwaha, An efficient watermarking for protecting signature biometric template\/\/2018 5th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE. 413\u2013418 (2018). https:\/\/doi.org\/10.1109\/spin.2018.8474269","DOI":"10.1109\/spin.2018.8474269"},{"key":"3249_CR11","doi-asserted-by":"publisher","unstructured":"M. Garg, J.S. Ubhi, A.K. Aggarwal, Current advancements in steganography: A review. Modeling and optimization of signals using machine learning techniques. 327\u2013348 (2024). https:\/\/doi.org\/10.1002\/9781119847717.ch17","DOI":"10.1002\/9781119847717.ch17"},{"key":"3249_CR12","unstructured":"M. Garg, J.S. Ubhi, A.K. Aggarwal, Steganography and its advancements in Spatial domain. Easy Chair Preprint 2019 (2177)"},{"issue":"2","key":"3249_CR13","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/jbhi.2021.3123936","volume":"27","author":"B Han","year":"2021","unstructured":"B. Han, R.H. Jhaveri, H. Wang, D. Qiao, J. Du, Application of robust zero-watermarking method based on federated learning for Securing the healthcare data. IEEE J. Biomedical Health Inf. 27(2), 804\u2013813 (2021). https:\/\/doi.org\/10.1109\/jbhi.2021.3123936","journal-title":"IEEE J. Biomedical Health Inf."},{"key":"3249_CR14","doi-asserted-by":"publisher","first-page":"103431","DOI":"10.1016\/j.dsp.2022.103431","volume":"126","author":"MT Hanna","year":"2022","unstructured":"M.T. Hanna, Discrete fractional Hankel transform based on a nonsymmetric kernel matrix. Digit. Signal Proc. 126, 103431 (2022). https:\/\/doi.org\/10.1016\/j.dsp.2022.103431","journal-title":"Digit. Signal Proc."},{"issue":"5","key":"3249_CR15","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1007\/s00034-021-01911-6","volume":"41","author":"MT Hanna","year":"2022","unstructured":"M.T. Hanna, Fractionalization of a discrete Hankel transform based on an involutory symmetric kernel matrix. Circuits Syst. Signal. Process. 41(5), 2750\u20132778 (2022). https:\/\/doi.org\/10.1007\/s00034-021-01911-6","journal-title":"Circuits Syst. Signal. Process."},{"key":"3249_CR16","doi-asserted-by":"publisher","unstructured":"A. Hedayat, W.D. Wallis, Hadamard matrices and their applications. Annals Stat. 1184\u20131238 (1978). https:\/\/doi.org\/10.1515\/9781400842902","DOI":"10.1515\/9781400842902"},{"key":"3249_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.ins.2020.01.019","volume":"519","author":"HT Hu","year":"2020","unstructured":"H.T. Hu, L.Y. Hsu, H.H. Chou, An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf. Sci. 519, 161\u2013182 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.01.019","journal-title":"Inf. Sci."},{"key":"3249_CR18","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","volume":"118","author":"P Kadian","year":"2021","unstructured":"P. Kadian, S.M. Arora, N. Arora, Robust digital watermarking techniques for copyright protection of digital data: a survey. Wireless Pers. Commun. 118, 3225\u20133249 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08177-w","journal-title":"Wireless Pers. Commun."},{"issue":"12","key":"3249_CR19","doi-asserted-by":"publisher","first-page":"8127","DOI":"10.1007\/s13369-018-3355-3","volume":"43","author":"M Kaur","year":"2018","unstructured":"M. Kaur, V. Kumar, Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab. J. Sci. Eng. 43(12), 8127\u20138144 (2018). https:\/\/doi.org\/10.1007\/s13369-018-3355-3","journal-title":"Arab. J. Sci. Eng."},{"issue":"2","key":"3249_CR20","doi-asserted-by":"publisher","first-page":"940","DOI":"10.12694\/scpe.v26i2.3924","volume":"26","author":"S Kaur","year":"2025","unstructured":"S. Kaur, M.K. Sachan, A.K. Aggarwal, Classification of Royal delicious apples using hybrid feature selection and feature weighting method based on SVM classifier. Scalable Computing: Pract. Experience. 26(2), 940\u2013949 (2025). https:\/\/doi.org\/10.12694\/scpe.v26i2.3924","journal-title":"Scalable Computing: Pract. Experience"},{"issue":"10","key":"3249_CR21","doi-asserted-by":"publisher","first-page":"15553","DOI":"10.1007\/s11042-022-13907-8","volume":"82","author":"A Khan","year":"2023","unstructured":"A. Khan, K.S. Wong, High payload watermarking based on enhanced image saliency detection. Multimedia Tools Appl. 82(10), 15553\u201315571 (2023). https:\/\/doi.org\/10.1007\/s11042-022-13907-8","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"3249_CR22","doi-asserted-by":"publisher","first-page":"3749","DOI":"10.1007\/s11042-020-09854-x","volume":"80","author":"V Kumar","year":"2021","unstructured":"V. Kumar, A. Girdhar, A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach. Multimedia Tools Appl. 80(3), 3749\u20133773 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09854-x","journal-title":"Multimedia Tools Appl."},{"issue":"9","key":"3249_CR23","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1002\/jcd.21522","volume":"24","author":"V Kuperberg","year":"2016","unstructured":"V. Kuperberg, Hadamard matrices modulo p and small modular Hadamard matrices. J. Comb. Designs. 24(9), 393\u2013405 (2016). https:\/\/doi.org\/10.1002\/jcd.21522","journal-title":"J. Comb. Designs"},{"key":"3249_CR24","doi-asserted-by":"publisher","first-page":"117248","DOI":"10.1109\/access.2022.3217920","volume":"10","author":"S Mehraj","year":"2022","unstructured":"S. Mehraj, S. Mushtaq, S.A. Parah, K.J. Giri, J.A. Sheikh, A.H. Gandomi, M. Hijji, Muhammad. Spatial domain-based robust watermarking framework for cultural images. IEEE Access. 10, 117248\u2013117260 (2022). https:\/\/doi.org\/10.1109\/access.2022.3217920","journal-title":"IEEE Access."},{"issue":"2","key":"3249_CR25","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/tmi.2018.2865709","volume":"38","author":"P Naylor","year":"2018","unstructured":"P. Naylor, M. La\u00e9, F. Reyal, T. Walter, Segmentation of nuclei in histopathology images by deep regression of the distance map. IEEE Trans. Med. Imaging. 38(2), 448\u2013459 (2018). https:\/\/doi.org\/10.1109\/tmi.2018.2865709","journal-title":"IEEE Trans. Med. Imaging"},{"issue":"1","key":"3249_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11277-021-08895-1","volume":"122","author":"F Nejati","year":"2022","unstructured":"F. Nejati, H. Sajedi, A. Zohourian, Fragile watermarking based on QR decomposition and fourier transform. Wireless Pers. Commun. 122(1), 211\u2013227 (2022). https:\/\/doi.org\/10.1007\/s11277-021-08895-1","journal-title":"Wireless Pers. Commun."},{"issue":"4","key":"3249_CR27","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1080\/00207217.2016.1242162","volume":"104","author":"SA Parah","year":"2017","unstructured":"S.A. Parah, J.A. Sheikh, U.I. Assad, G.M. Bhat, Realisation and robustness evaluation of a blind Spatial domain watermarking technique. Int. J. Electron. 104(4), 659\u2013672 (2017). https:\/\/doi.org\/10.1080\/00207217.2016.1242162","journal-title":"Int. J. Electron."},{"key":"3249_CR28","doi-asserted-by":"publisher","unstructured":"Y. Qiu, S. Jiao, Q. Su, Enhancing color image watermarking via fast quaternion Schur decomposition: a high-quality blind approach. Visual Comput. 1\u201319 (2024). https:\/\/doi.org\/10.1007\/s00371-024-03674-y","DOI":"10.1007\/s00371-024-03674-y"},{"issue":"7","key":"3249_CR29","doi-asserted-by":"publisher","first-page":"4019","DOI":"10.1007\/s00034-023-02299-1","volume":"42","author":"M Rai","year":"2023","unstructured":"M. Rai, S. Goyal, M. Pawar, An optimized deep fusion convolutional neural network-based digital color image watermarking scheme for copyright protection. Circuits Syst. Signal. Process. 42(7), 4019\u20134050 (2023). https:\/\/doi.org\/10.1007\/s00034-023-02299-1","journal-title":"Circuits Syst. Signal. Process."},{"issue":"1","key":"3249_CR30","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.32604\/cmc.2022.029408","volume":"73","author":"Y Sun","year":"2022","unstructured":"Y. Sun, C. Zhu, Cui. Speech encryption with fractional watermark. CMC-Computers Mater. Continua. 73(1), 1817\u20131825 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.029408","journal-title":"CMC-Computers Mater. Continua"},{"key":"3249_CR31","unstructured":"University of Granada, Computer Vision group, CVG-UGR image database. http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/c512.php"},{"key":"3249_CR32","unstructured":"University of Southern California, Signal and Image Processing Institute, USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/"},{"key":"3249_CR33","doi-asserted-by":"publisher","first-page":"e1427","DOI":"10.7717\/peerj-cs.1427","volume":"9","author":"J Varghese","year":"2023","unstructured":"J. Varghese, O.B. Hussain, S. Subash, An effective digital image watermarking method incorporating DCT, DFT and SVD transformations. PeerJ Comput. Sci. 9, e1427 (2023). https:\/\/doi.org\/10.7717\/peerj-cs.1427","journal-title":"PeerJ Comput. Sci."},{"issue":"1","key":"3249_CR34","doi-asserted-by":"publisher","first-page":"6618382","DOI":"10.1155\/2024\/6618382","volume":"2024","author":"W Wu","year":"2024","unstructured":"W. Wu, Y. Dong, G. Wang, Image robust watermarking method based on DWT-SVD transform and chaotic map. Complexity. 2024(1), 6618382 (2024). https:\/\/doi.org\/10.1155\/2024\/6618382","journal-title":"Complexity"},{"issue":"4","key":"3249_CR35","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.vrih.2023.06.012","volume":"6","author":"ZWKH U","year":"2024","unstructured":"Z.W.K.H. U, Z.H. U, S. Yang, X. Wang, Robust blind image watermarking based on interest points. Virtual Real. Intell. Hardw. 6(4), 308\u2013322 (2024). https:\/\/doi.org\/10.1016\/j.vrih.2023.06.012","journal-title":"Virtual Real. Intell. Hardw."},{"issue":"5","key":"3249_CR36","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.1007\/s11042-021-11704-3","volume":"81","author":"Z Xia","year":"2022","unstructured":"Z. Xia, W. Zhang, H. Duan, J. Wang, X. Wei, Fragile watermarking method in Spatial domain based on prime number distribution theory. Multimedia Tools Appl. 81(5), 6477\u20136496 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11704-3","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"3249_CR37","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1049\/cit2.12282","volume":"9","author":"Y Yuan","year":"2024","unstructured":"Y. Yuan, J. Li, J. Liu, U.A. Bhatti, Z. Liu, Y. Chen, Robust zero-watermarking algorithm based on discrete wavelet transform and Daisy descriptors for encrypted medical image. CAAI Trans. Intell. Technol. 9(1), 40\u201353 (2024). https:\/\/doi.org\/10.1049\/cit2.12282","journal-title":"CAAI Trans. Intell. Technol."},{"issue":"3","key":"3249_CR38","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.32604\/csse.2022.022305","volume":"41","author":"X Zhang","year":"2022","unstructured":"X. Zhang, W. Zhang, W. Sun, X. Sun, S.K. Jha, A robust 3-D medical watermarking based on wavelet transform for data protection. Comput. Syst. Sci. Eng. 41(3), 1043\u20131056 (2022). https:\/\/doi.org\/10.32604\/csse.2022.022305","journal-title":"Comput. Syst. Sci. Eng."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03249-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03249-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03249-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T03:28:47Z","timestamp":1764473327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03249-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":38,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["3249"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03249-9","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"21 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}